Results 1 - 10
of
74
Volume I: Computer Science and Software Engineering
, 2013
"... Algebraic algorithms deal with numbers, vectors, matrices, polynomials, for-mal power series, exponential and differential polynomials, rational functions, algebraic sets, curves and surfaces. In this vast area, manipulation with matri-ces and polynomials is fundamental for modern computations in Sc ..."
Abstract
- Add to MetaCart
Algebraic algorithms deal with numbers, vectors, matrices, polynomials, for-mal power series, exponential and differential polynomials, rational functions, algebraic sets, curves and surfaces. In this vast area, manipulation with matri-ces and polynomials is fundamental for modern computations
Program transformation and runtime support for threaded MPI execution on shared-memory machines
- ACM Transactions on Programming Languages and Systems
, 2000
"... Parallel programs written in MPI have been widely used for developing high-performance applications on various platforms. Because of a restriction of the MPI computation model, conventional MPI implementations on shared memory machines map each MPI node to an OS process, which can suffer serious per ..."
Abstract
-
Cited by 19 (1 self)
- Add to MetaCart
performance degradation in the presence of multiprogramming. This paper studies compile-time and runtime techniques for enhancing performance portability of MPI code running on multiprogrammed shared memory machines. The proposed techniques allow MPI nodes to be executed safely and efficiently as threads
Human Trust Establishment
, 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract
- Add to MetaCart
the desperation of users. To establish a secure basis for Internet communication, we propose SafeSlinger, a system leveraging the proliferation of smartphones to enable people to securely and privately exchange their public keys. Through the exchanged authentic public key, SafeSlinger establishes a secure channel
i A TRANSIENT COMPUTATIONAL FLUID DYNAMIC STUDY OF A LABORATORY-SCALE FLUORINE
"... Fluorine gas is produced industrially by electrolysing hydrogen fluoride in a potassium acid fluoride electrolyte. Fluorine is produced at the carbon anode, while hydrogen is produced at the mild-steel cathode. The fluorine produced has a wide range of uses, most notably in the nuclear industry wher ..."
Abstract
- Add to MetaCart
Fluorine gas is produced industrially by electrolysing hydrogen fluoride in a potassium acid fluoride electrolyte. Fluorine is produced at the carbon anode, while hydrogen is produced at the mild-steel cathode. The fluorine produced has a wide range of uses, most notably in the nuclear industry
ALGEBRAIC ALGORITHMS1
, 2012
"... This is a preliminary version of a Chapter on Algebraic Algorithms in the up- ..."
Abstract
- Add to MetaCart
This is a preliminary version of a Chapter on Algebraic Algorithms in the up-
Literature Review A Dynamic Control System for Energy Efficient Cooling of Data Centres A Dynamic Control System for Energy Efficient Cooling of Data Centres
"... Overview This literature review analyses 4 academic papers. The main objectives of the review are to: 1. Trace the evolution of recent (2000 -2011) data centre energy efficiency research and development 2. Document the most relevant and significant literature relating to energy efficient cooling fo ..."
Abstract
- Add to MetaCart
the de facto indicator of a data centre"s efficiency. It is defined as the ratio of all electricity used by the data centre to the electricity used just by the IT equipment. In contrast to the original PUE [3b] rated in kilowatts of power (kW), PUE2 must be the highest measured kilowatt hour (k
IEEE TRANSACTIONS ON COMMUNICATIONS (TO APPEAR) 1 Iterative Receiver Processing for OFDM Modulated Physical-Layer Network Coding in Underwater Acoustic Channels
"... Abstract—Physical-layer network coding (PLNC) allows two remote terminals to exchange information in two time slots via a half-duplex relay. In this paper, we consider PLNC in underwater acoustic (UWA) two-way relay networks, with particular attention on the recovery of the network-coded codeword at ..."
Abstract
- Add to MetaCart
Abstract—Physical-layer network coding (PLNC) allows two remote terminals to exchange information in two time slots via a half-duplex relay. In this paper, we consider PLNC in underwater acoustic (UWA) two-way relay networks, with particular attention on the recovery of the network-coded codeword
Results 1 - 10
of
74